Zango zapped in first part of PC Tools legal battle
Adware vendor gets mauling from U.S. judge
TechWorld.com - Adware company Zango has lost the first part of its legal battle to stop antimalware company PC Tools flagging its software as potentially troublesome adware.
In a judgement, U.S. District judge John C. Coughenour, dismissed Zango's main complaint that the antimalware company's classification of Zango as adware had been unfair to its image or business, pointing out the notoriety of the company's software.
Last October, The U.S. Federal Trade Commission (FTC) was reported to have come to an agreement with Zango, formerly 180Solutions, to pay a fine of $3 million as punishment for allowing the Zango Cash Toolbar to be used to serve unsolicited adware to millions of users.
Zango has acquired a poor image among spyware and adware watchers, and has been used as a component in a number of scams initiated by third parties using the platform. PC Tools currently classifies three of Zango's programs as PUPs (potentially unwanted programs).
"Its [PC Tools'] classification is not unreasonable given Zango's past conduct and in light of other companies' similar classification of the plaintiff's software," concluded Coughenour.
PC Tools CEO Simon Clausen was critical of Zango's motivation for launching the legal suit in the first place.
"Zango's attempts to pursue and compel us into reclassifying through legal action, rather than following due process, is not going to get them anywhere — and is certainly not the way to rehabilitate their image," he said.
"It is our duty as a security company to provide consumers with the most effective product we can. We will continue to be vigilant in our classification of threats and will not be intimidated by these types of lawsuits," he added.
The defeat is unlikely to stop Zango from defending itself in what looks like a concerted attempt to change its image. The company is already unusual for having brought the lawsuit at all, and has also granted interviews with journalists to defend itself from accusations of wrongdoing.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts